Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks, October 2009
Cited by
Year 2013 : 3 citations
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
D He, N Kumar, N Chilamkurti - Wireless and Pervasive …, 2013 - ieeexplore.ieee.org
An enhanced two-factor user authentication in wireless sensor networks
JJ Yuan - Telecommunication Systems, 2013 - Springer
User Authentication and Data Cryptograph System Based on Biometric Key for Wireless Sensor Networks?
Y CHEN, J SHU, F YANG, H CHEN - Journal of Computational …, 2013 - jofcis.com
Year 2012 : 5 citations
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
DZ Sun, JX Li, ZY Feng, ZF Cao, GQ Xu - Personal and Ubiquitous …, 2012 - Springer
Identity Authentication and Key Agreement Integrated Key Management Protocol for Heterogeneous Sensor Networks
C Ma, J Wang, P Wu, H Zhang - Journal of Computers, 2012 - 69.195.124.86
Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks
YC Lee, HY Lai, PJ Lee - International Journal of Engineering and …, 2012 - sparc.nfu.edu.tw
A user authentication-based probabilistic risk approach for Wireless Sensor Networks
Y Faye, I Niang, H Guyennet - Mobile and Wireless Networking …, 2012 - ieeexplore.ieee.org
Authentification Robuste par Mot de Passe Basée sur une Analyse Probabiliste de Risque d'Attaque par Déni de Service Dans les Réseaux de Capteurs Sans …
Y Faye, I Niang, H Guyennet - cari-info.org
Year 2011 : 3 citations
A survey of access control schemes in wireless sensor networks
Y Faye, I Niang, T Noel - Proc. World Acad. Sci. Eng. Tech, 2011 - waset.org
Cryptanalyses of a two-factor user authentication scheme in wireless sensor networks
Z Tan - Advances in Information Sciences and …, 2011 - The International Association for …
A Survey on Authentication Techniques for Wireless Sensor Networks
S Patil, BP Vijaya Kumar, S Singha, R Jamil - International Journal of Applied … - gimt.edu.in
Year 2010 : 2 citations
Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
MK Khan, K Alghathbar - Sensors, 2010 - mdpi.com
Security Analysis of 'Two–Factor User Authentication in Wireless Sensor Networks'
MK Khan, K Alghathbar - Advances in Computer Science and Information …, 2010 - Springer